Other Security Subjects

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Cisco CyberSecurity

Forum Posts

Hi guys!I've created a custom TCP and UDP connection signature for port 113 (ident/auth service).I want to exclude some of my internal IP addresses from firing this because it's routinely and legitimately used (e.g. SMTP server).Unfortunately this se...

giovanni by Level 1
  • 575 Views
  • 5 replies
  • 0 Helpful votes

New users with Compaq PC's running Win2k SP1 and Cisco VPN ver 3.0. After loading VPN Client, and re-starting, the PC goes into a perpetual boot. After un-installing the client, the PC returns to normal operation. Any help would be greatly appre...

hinesd by Level 1
  • 519 Views
  • 1 replies
  • 0 Helpful votes

I have a pix 515 with 6 interfaces (three of which are currently used). The second and third interfaces use private addresses in the 192.168.1/24 and 192.168.0/24 address ranges. The servers behind the third interface have their IP's statically map...

adrians by Level 1
  • 576 Views
  • 2 replies
  • 0 Helpful votes

Can anyone tell me why If I have a access list that only allows 80 and 443 to pass thru I can still see all other ports open when I run a penetration software such as Cyber Cop. Is there something that I need to add to keep these ports from Respondi...

pchicci by Level 1
  • 597 Views
  • 4 replies
  • 0 Helpful votes

Hi folks,I've seen 2 tier firewalling getting very common these days, i.e customers implementing 2 firewalls, usually PIX for DMZ and Checkpoint as 2nd layer for Internal LAN.What addition benefits does this kind of design really bring? And what are ...

robin by Level 1
  • 755 Views
  • 6 replies
  • 0 Helpful votes

Anyone out there have a list of properties that needmodification on the exchange server to allow mail to come in over the internet. I have the pix stuff, but claim no knowledge of the exchange piece. Thanks

millerv by Level 1
  • 597 Views
  • 2 replies
  • 0 Helpful votes

As I started working with netranger one of my first problem was, that the sensor is logging the attack signature, but not the answer of the attacked server. We are currently configured the sensor that it will create an iplog for most signatures at l...

pheuch by Level 1
  • 514 Views
  • 1 replies
  • 0 Helpful votes
Top Solution Authors